fraud
"You Have Been Selected for Family Resettlement to Australia," began the email that included the seal of the Embassy of...Read more
Researching online scams opens a window into the world of deceit, offering a glimpse into human vulnerabilities that...Read more
Cormac Herley’s paper Why do Nigerian Scammers Say They are from Nigeria? explains how some purposefully-lame scam...Read more
When discussing scams and malicious activities that have utilized the linkedin.com website, I alluded to the use of fake of...Read more
Although malicious activities that involve LinkedIn aren’t as popular as those associated with other social networking...Read more
In an earlier note I discussed why malicious LinkedIn activities seem less prevalent Facebook and Twitter ones. Yet, the...Read more
When discussing the risks of fraud, malware and other scams on social networking sites, security professionals often refer...Read more
Social engineering is frequently used in computer attacks as well as in other forms of on-line fraud. Scammers rely on...Read more
I am very interested in the way real-world attackers—rather than penetration testers—use social engineering techniques....Read more